This is not the point, to âcreateâ a detection AFTER THE FACT. Anyone can do this, including MSE: create a signature once you have the malware âin handâ
The expectation from Avast! is to block the ransomvare using a different mechanism (HIPS, behavior blocker, etc) , not only based on a signature.
VL-Info:In such tests it is very important to simulate infection vectors correctly, if the guy just copied the executable to desktop and run it, it is not totaly valid test case. Such samples are delivered to system from network, resides in temporal directories etc. Tested executable has standalone behavior same as any tool for mass re-encoding the file for example.
if the file is copied from a USB or an external HDD, it would yield the same result. Not everyone downloading files from the internet all the time. Why not making CC available for files not downloaded from the browser?
Also, it should be worth mentioned that Windows Defender on windows 10 already has âControlled folder accessâ which is quite similar to avastâs âRansomware Shieldâ. He demonstrated on another video that WD was bypassed by a ransomware but at least the protected folder is safe
Ransomware shield should be implemented in avast free